US9226224B1 - Method and system for obtaining information about Wi-Fi enabled telecommunications devices - Google Patents
Method and system for obtaining information about Wi-Fi enabled telecommunications devices Download PDFInfo
- Publication number
- US9226224B1 US9226224B1 US13/868,723 US201313868723A US9226224B1 US 9226224 B1 US9226224 B1 US 9226224B1 US 201313868723 A US201313868723 A US 201313868723A US 9226224 B1 US9226224 B1 US 9226224B1
- Authority
- US
- United States
- Prior art keywords
- beacon
- detected
- telecommunications
- beacons
- telecommunications device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Definitions
- the present invention relates generally to a method, system and computer program used in connection with a Wi-Fi beacon that listens to signals being transmitted by cellular telephones, smartphones and other portable telecommunications devices with Wi-Fi connectivity, and determines the presence and optionally position of such devices in a range of the beacon.
- the present invention also relates to several methods, systems and computer programs for using the information about the presence and optionally location of cellular telephones, smartphones and other portable telecommunications devices obtained by the Wi-Fi beacon.
- the information may be used to control mechanical and electrical systems, such as a gate or door regulating mechanism, and/or to control an electronic system, such as a transmission or communications unit that directs general or customized messages, texts and the like to one or more of the detected telecommunications devices.
- the present invention relates to a method, system and computer program for obtaining information about one or more telecommunications devices that transmit signals seeking available Wi-Fi connectivity.
- one or more Wi-Fi beacons are configured to detect probing signals from any telecommunications device in its defined range
- a processor at or associated with each Wi-Fi beacon extracts an identifier of each telecommunications device in the defined range from detected probing signals and each Wi-Fi beacon is associated with the identifier of any telecommunications devices whose probing signals have been received by that Wi-Fi beacon to thereby determine the presence and optionally position of any telecommunications devices within the range of the Wi-Fi beacon.
- the telecommunications devices are not involved in the method other than providing, in their usual manner of operation, probing signals containing identifiers.
- Added features include determining, at one or more of the Wi-Fi beacons, a position of a telecommunications device whose probing signal has been detected by that Wi-Fi beacon. This may be accomplished by approximating the position of the telecommunications device relative to the Wi-Fi beacon based on strength of the probing signal. Alternatively, it may be accomplished by approximating the absolute position of the telecommunications device based on strength of the probing signal detected by the Wi-Fi beacon and a known position of the Wi-Fi beacon.
- the position of one or more of the telecommunications device is known, it is possible to generate a map of an area within range of the Wi-Fi beacons on a display or a plurality of displays, and indicate the position of the telecommunications device on the map.
- Movement of the telecommunications device can be monitored by analyzing variations in strength of the probing signals being detected by the Wi-Fi beacons, or changes in position of the telecommunications device determined as mentioned above.
- One or more devices may be independently or dependently controlled based on the determined presence and optionally position of any telecommunications devices within the range of at least one of the Wi-Fi beacons.
- the device may be an entry control mechanism that unlocks, opens, closes and/or locks a gate or door based on the presence of a particular telecommunications device or devices within a predetermined range.
- At least one of the Wi-Fi beacons is installed at or proximate a commercial establishment (e.g., a store), and a general or customized message containing an advertisement or coupon relating to the commercial establishment is directed to at least one detected telecommunications device within the range of that Wi-Fi beacon.
- a commercial establishment e.g., a store
- a general or customized message containing an advertisement or coupon relating to the commercial establishment is directed to at least one detected telecommunications device within the range of that Wi-Fi beacon.
- a number of telecommunications devices passing in a vicinity of at least one of the Wi-Fi beacons in a set time period may be detected by determining a number of non-repeating identifiers of telecommunications devices whose probing signals are detected by that Wi-Fi beacon.
- an embodiment of the invention to assess efficacy of advertising for a physical establishment by placing a first one of the Wi-Fi beacons in a vicinity of an advertisement for the establishment, creating a database of identifiers of telecommunications devices whose probing signals are detected by the first Wi-Fi beacon, placing a second one of the Wi-Fi beacons in or in a vicinity of the establishment, and analyzing whether identifiers of telecommunications devices whose probing signals are detected by the second Wi-Fi beacon have been previously detected by the first Wi-Fi beacon.
- FIG. 1 shows a flow chart of a method in accordance with the invention for obtaining information about telecommunications devices
- FIG. 2 is a schematic of a first exemplifying, non-limiting application of use of the invention
- FIG. 3 is a flow chart of a second exemplifying, non-limiting application of use of the invention.
- FIG. 4 is a schematic of a third exemplifying, non-limiting application of use of the invention.
- FIG. 5 shows a system that can implement the invention, and execute the computer programs in accordance with the invention.
- FIG. 1 shows a flow chart of a basic method 10 in accordance with the invention for obtaining information about telecommunications devices that transmit signals seeking available Wi-Fi connectivity. Such signals are often known as probing signals.
- one or more Wi-Fi beacons are configured to detect probing signals from any telecommunications device in its defined range.
- the Wi-Fi beacons may be considered nodes. This detection is possible because the Wi-Fi beacons inherently listen for probing signals emitted by Wi-Fi-enabled telecommunications devices when operational.
- the Wi-Fi beacons may be at fixed positions whose positional coordinates are known, at least when the method is implemented.
- the next step 14 is to extract at each Wi-Fi beacon, an identifier of each telecommunications device from any detected probing signals.
- This extraction step 14 is performed at the Wi-Fi beacon.
- the identifier may be in any known format of identifiers for telecommunications devices, with each telecommunications device having a unique identifier.
- the Wi-Fi beacons may be configured with a defined range or detection threshold, i.e., the identification of only telecommunications devices within a specific distance or that have a signal strength above a threshold are extracted. Thus, the number of identifications provided by a Wi-Fi beacon may be less than the number of telecommunications devices capable of being detected.
- a detected telecommunications device by a Wi-Fi beacon will generally mean a telecommunications device that satisfies a distance or signal strength threshold.
- the identifier provided by the telecommunications device may be associated with a more specific identification relating to the telecommunications device, such as the name of the user of the telecommunications device. This association may occur by manual entry of the name of the user by a computer program that controls the Wi-Fi beacon, or reference to a database in which previously manually entered information is stored.
- the computer program may be resident in a computer or other processing unit that is connected to the beacon, and the database.
- a user input screen may be generated that asks for input of the name of the user of the detected telecommunications device in order to register the telecommunications device with the system, and optionally a description of the telecommunications device (for use, for example, when the same user has more than one telecommunications device).
- the computer program generates the user input screen, monitors the user input and then associates the telecommunications device identifier with the user-input identification information, and directs this information to the database.
- each Wi-Fi beacon is associated with the identifier of any telecommunications devices whose probing signals have been received by that Wi-Fi beacon to thereby enable the presence of any telecommunications devices within the range of the Wi-Fi beacon to be determined, step 18 , for example, by the processor associated with the beacon.
- This information may be retrieved by a computer program that generates, manages and maintains a database identifying beacons, preferably each beacon's location, and any telecommunications device detected by the beacons.
- the computer program may be resident at storage media in a common unit with the processor associated with the beacon. The following table shows the manner in which such information may be displayed:
- Such a table is not required to be created but rather the information may be maintained in a database in whatever format is used for data storage.
- the database may be accessed by the processor associated with the beacon, or a central monitoring facility, to determine which people are around a specific location (location search to obtain telecommunication device users), or where a particular individual is (person search to obtain their location).
- Use of the invention for corporations would be beneficial because by locating a Wi-Fi beacon in each corporate store, e.g., each coffee shop in a chain of coffee shops, the corporations would be able to compile a list of the users in and around their coffee shops.
- the lists may be analyzed for numerous reasons, e.g., targeted marketing, rewards programs, and the like.
- the position of the telecommunications device may also be determined or more specifically calculated, especially if presence determination of the same telecommunications device is detected at multiple Wi-Fi beacons. That is, if more than one Wi-Fi beacon detects the presence of the same identifier of a telecommunications device, computational means, such as triangulation, may be used to determine the precise position of the telecommunications device.
- Additional or alternative techniques to determine the position of a telecommunications device whose probing signal has been detected by a Wi-Fi beacon is to approximate the position of the telecommunications device relative to the Wi-Fi beacon based on strength of the probing signal, and to approximate the absolute position of the telecommunications device based on the strength of the probing signal detected by the Wi-Fi beacon and a known position of the Wi-Fi beacon.
- the strength of the probing signal is often proportional to the distance between the Wi-Fi beacon and the telecommunications device.
- These techniques may be implemented by a computer program on storage media resident at a common housing with the processor associated with the Wi-Fi beacon, e.g., a computer that is connected to the Wi-Fi beacon.
- the telecommunications devices are not involved in the method other than providing in their usual manner of operation, probing signals containing identifiers, i.e., they do not have to be programmed to emit any special signals or include any special programming to enable their functionality with the techniques described herein.
- a responsive signal from the Wi-Fi beacon to the telecommunications device is not necessary to establish the presence and optionally position of the telecommunications device. It is not necessary to exchange communications between the beacon and the telecommunications device.
- cell phone towers and other infrastructure used to transmit and receive telecommunications signals between telecommunications devices, whether voice or data, are also not needed in the invention.
- Each Wi-Fi beacon can be configured as a node to monitor a plurality of channels over which telecommunications devices are able to transmit probing signals.
- each Wi-Fi beacon is configured to continuously monitor the plurality of channels.
- the Wi-Fi beacon listens for probing signals on one or more channels that are used for such transmissions.
- each Wi-Fi beacon may be configured to listen for probing signals on all possible channels.
- determining the presence of a specific telecommunications device in the range of a Wi-Fi beacon it becomes possible to monitor movement of the telecommunications device by analyzing variations in strength of the probing signals being detected by the Wi-Fi beacons, since the signal strength typically changes during movement. This monitoring may be accomplished by the processor associated with the Wi-Fi beacon or by a remote processor coupled to the processor of the Wi-Fi beacon. Variations in strength may be correlated to distance from the Wi-Fi beacon, i.e., when the telecommunications device is closer to the Wi-Fi beacon, the signal strength of the probing signal is greater than when the telecommunications device is more distant from the Wi-Fi beacon.
- Wi-Fi beacon By configuring a Wi-Fi beacon to continuously monitor the plurality of channels, changes in position of the telecommunications devices are obtained in real-time. This is possible because Wi-Fi-enabled telecommunications devices usually transmit probing signals at a frequency of about 1 time every 30 seconds.
- the mere reception of a probing signal from a Wi-Fi enabled telecommunications device may be used to determine not only the presence of that device in the range of the beacon but also the absolute and/or relative position of the device.
- the Wi-Fi beacon or the computer associated therewith may generate and store data about identifiers of telecommunications devices whose probing signals have been detected, and provide its identification with the identifiers of such telecommunications devices to a remote location.
- the information about the telecommunications device, along with location information about the Wi-Fi beacon provided by the Wi-Fi beacon or derived from the transmission therefrom, is used for a variety of different applications.
- a processor at the remote location communicates with the processor associated with the Wi-Fi beacon in any conventional manner, e.g., using the Internet.
- reaction or response may be conditional, i.e., if certain telecommunications devices are detected, the reaction or response takes one form and if other telecommunications devices are detected, the reaction or response takes a different form.
- a map may be generated by a computer program for presentation on a display connected to the computer.
- the map may include known structures and then the indication of the presence of each telecommunications device, with an identification thereof, e.g., the name of the user of the telecommunications device.
- the arrangement of the aisle and booths of the trade show may form the base of the map and then a dot is superimposed on this map at the calculated position of the telecommunications device with an indication of the name of the user of the telecommunications device.
- a number of telecommunications devices passing in a vicinity of a Wi-Fi beacon in a set time period is determined by determining a number of non-repeating identifiers of telecommunications devices whose probing signals are detected by the Wi-Fi beacon. This may be useful to count people in numerous situations, for example, passing by a retail store, in a crowd, in an airport, in a mall, etc.
- Another application is to assess efficacy of advertising for a physical establishment such as a retail store 28 by placing a first Wi-Fi beacon 22 in a vicinity of an advertisement 20 for the establishment 28 , creating a database 26 of identifiers of telecommunications devices (devices-ID- 1 , 2 , 3 , 4 , 5 ) whose probing signals are detected by the first Wi-Fi beacon 22 , which may be performed by a processor 24 of the first Wi-Fi beacon 22 , and placing a second Wi-Fi beacon 30 in or in a vicinity of the establishment 28 , i.e., inside the store.
- two Wi-Fi beacons may be arranged at the store, one at the entrance to detect people entering, and one at the cashier to detect people purchasing.
- further detailed assessment of the effectiveness of the advertisement 20 can be obtained by determining how many people respond to the advertisement 20 and enter the store and how many of the people entering the store purchase something, whether the advertised product or something else.
- a coupon or other type of advertisement for a commercial establishment may be directed to telecommunications devices determined to be within a threshold distance of the store.
- a threshold distance of the store e.g. 100 feet
- the system is operated by a processor, or computer, coupled to the Wi-Fi beacon and as the Wi-Fi beacon detects telecommunications devices in step 36 , processor directs messages to detected telecommunications devices, step 38 , each message including a coupon or other inducement to enter the store and purchase goods or services offered for sale.
- a computer program operating in conjunction with the processor may be designed to direct messages via a transmission or communications unit, possibly the Wi-Fi beacon itself, only to registered telecommunications devices, i.e., telecommunications devices whose users have provided identification information and an indication of willingness to receive advertisements for the specific store.
- the telecommunications device indicates receipt of a message, ideally while the person is still within the vicinity of the store, which may prompt the person to enter the store and purchase goods or services, whether subject to the advertisement or otherwise.
- the Wi-Fi beacon can also be used to detect if the person has entered the store, step 40 , e.g., monitoring the position of the telecommunications device reveals whether its position has changed to be closer to the Wi-Fi beacon, which would be a good indication of entry of the person into the store.
- traffic in a particular or defined area may be monitored, e.g., at or around a booth 42 of a trade show.
- one or more of Wi-Fi beacons 44 , 46 , 48 , 50 are arranged to detect probing signals originating from telecommunications devices in or around the booth 42 .
- the number of people in or around the trade show booth 42 is analyzed by determining a number of non-repeating identifiers of telecommunications devices whose probing signals are detected by the Wi-Fi beacons 44 , 46 , 48 , 50 that detected probing signals originating from telecommunications devices in or around the trade show booth 42 . This greatly simplifies and improves the ability to count visitors to a trade show booth 42 or other site of interest.
- the Wi-Fi beacon may be installed and used as an authorization device to regulate entry through a gate or door.
- a Wi-Fi beacon is installed at or proximate to the gate, door or other entry, and detects telecommunications devices in its proximity.
- the Wi-Fi beacon is coupled to an automatic unlocking or opening mechanism including a processor or comparable data processing unit. The automatic unlocking or opening mechanism unlocks the gate or door or opens the gate or door only when the detected telecommunications device meets conditions for entry through the gate or door.
- a list of authorized people may be maintained along with identifications of their telecommunications devices, so that when a person approaches the Wi-Fi beacon, the Wi-Fi beacon detects their telecommunications device, accesses the list to ascertain whether the user of the telecommunications device is on the list and only if so, directs the mechanism to unlock and open the gate or door. If the user of the telecommunications device is not on the list, the Wi-Fi beacon does not direct opening or unlocking of the gate or door, and alternatively may sound an alarm.
- the processor may consider signal strength to unlock or open door the gate or door to ensure that the person is in close proximity to the gate or door, i.e., only when the signal strength is above a threshold indicative of close proximity to the gate door does the gate or door unlock or open.
- This technique enables telecommunications devices to be used as security badges, relying on the assumption that the telecommunications device is in possession of its rightful owner.
- the Wi-Fi beacon can detect when the telecommunications device no longer provides measurable signal strength above the threshold, indicative of movement away from the gate or door.
- the Wi-Fi beacon can provide this change in position information to the processor which could then lock or close the gate or door.
- the various applications of the invention described above are useable solely based on detection of a telecommunications device by Wi-Fi beacons, it is preferable, as mentioned several times above, for the telecommunications devices to be registered with the system. Registration enables association of telecommunications device identifiers with the names of their owners/users and possibly other personal information about the owners/users. Such information will aid in the generation of messages containing coupons to the telecommunications, for the embodiment described above with reference to FIG. 3 . It will also aid in searching for a specific user by name.
- the foregoing techniques to identify a telecommunications device are operable simply by virtue of the telecommunications device being used in a Wi-Fi connectivity mode wherein it continually sends out probe signals to search for available Wi-Fi beacons.
- the invention does not require the telecommunications device to use radio frequency identification (RFID) techniques or near field communication (NFC) techniques.
- RFID radio frequency identification
- NFC near field communication
- the environment in which the techniques described above may be implemented is basically with a computer 52 and two Wi-Fi beacons 54 connected to the computer 52 . Although two Wi-Fi beacons 54 are shown, one or more than two Wi-Fi beacons may be connected to the same computer 52 .
- the computer 52 includes one or more user interfaces, e.g., a mouse, keyboard and the like, and a display. The user interfaces enable entry of the identification information of the user into a memory component associated with the computer 52 when their telecommunications device is detected and an input screen is displayed on the display, i.e., to facilitate the registration process.
- the display of the computer 52 is also used to show the map of the area around the Wi-Fi beacon(s) 54 and the position of detected telecommunications devices within that area.
- the computer 52 includes usual computer hardware and software, including one or more data storage/memory devices wherein computer programs are stored. These computer programs may be any of those disclosed herein.
- any type of processing unit may be used to implement the method and system in accordance with the invention, including, e.g., a laptop, notebook, tablet, a PALM-type unit, and the like.
- the foregoing techniques may be applied by a computer program executed by the processor of the computer 52 and associated with the Wi-Fi beacon(s) 54 , from any type of computer-readable medium onto which computer software is embodied.
- the computer program is configured to cause one or more of the Wi-Fi beacons 54 to monitor channels for probing signals from telecommunications devices, extract an identifier of each telecommunications device from detected probing signals, associate with the identifier of any telecommunications devices whose probing signals have been received by that Wi-Fi beacon with the Wi-Fi beacon, and then provide an identification of the Wi-Fi beacon with the identifiers of telecommunications devices whose probing signals have been received by that Wi-Fi beacon to the computer 52 .
- identification associations may be stored in a memory component associated with the computer 52 , and provided on the display or output in another form, e.g., transmitted to a remote unit, when desired or upon command by monitoring personnel.
- the identification associations do not have to be displayed or output but rather may be simply be accessed by a computer program when it is desired to use the information for, for example, advertising, security purposes, etc.
- the computer program thereby determines presence of any telecommunications devices within the range of the Wi-Fi beacon.
- the computer program may also be configured to enable registration of the telecommunications devices, e.g., provide a screen on the display for manual entry of the user's name to associate with the telecommunications device.
- the computer program may provide the identification to a computer associated with or communicatively coupled to the Wi-Fi beacon, but at a remote location.
- the remote location may be, for example, a computer at any site or facility that is interested in knowing how many people having active telecommunications devices are within range of the Wi-Fi beacon, as counted by the number of non-repeating identifiers extracted by the computer program at the Wi-Fi beacon.
- the computer program executed by the computer 52 may be designed to convey, through a telecommunications network or wired network (the hardware and software for which may be incorporated into the computer 52 ), the identifiers of the telecommunications devices whose probing signals were detected.
- a reverse directory may be used to obtain, from the identifiers, identification information for the purpose of, for example, directing advertisements to the telecommunications device which might be interest to the user, as determined by known interests or the area in which the telecommunications device is situated (see FIG. 3 described above).
- a person determined to be proximate a specific store might be directed an advertisement for that store. More specifically, a person know to like sports might be directed an advertisements for sports equipment at a nearby sports store.
- Additional enhancements to the computer program include the capability of determining a position of a telecommunications device whose probing signal has been detected, in any of the ways described above, and monitoring movement of the telecommunications device by analyzing variations in strength of the probing signals being detected.
- computer-readable medium could be any means that can contain, store, communicate, propagate or transmit a program for use by or in connection with the method, system, apparatus or device.
- the computer-readable medium can be, but is not limited to (not an exhaustive list), electronic, magnetic, optical, electromagnetic, infrared, or semi-conductor propagation medium.
- the medium can also be (not an exhaustive list) an electrical connection having one or more wires, a portable computer diskette, a random access memory (RAM), a read-only memory (ROM), an erasable, programmable, read-only memory (EPROM or Flash memory), an optical fiber, and a portable compact disk read-only memory (CDROM).
- the medium can also be paper or other suitable medium upon which a program is printed, as the program can be electronically captured, via for example, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory. Also, a computer program or data may be transferred to another computer-readable medium by any suitable process such as by scanning the computer-readable medium.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Beacon/Node | Detected Telecommunications | |
Identification | Beacon/Node Location | Devices |
0001 | 2 Penn Plaza, New York, | Marian G., Carmelo A., |
NY 10121 | Kenyon M. | |
0007 | River Avenue and East | Derek J., Mariano R., |
161st, Bronx, NY 10451 | Wade B., Don M. | |
0014 | 123-01 Roosevelt Ave, | David W., Marlon B., |
Corona, NY 11368 | Ruben T. | |
Claims (15)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/868,723 US9226224B1 (en) | 2012-04-23 | 2013-04-23 | Method and system for obtaining information about Wi-Fi enabled telecommunications devices |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261637084P | 2012-04-23 | 2012-04-23 | |
US13/868,723 US9226224B1 (en) | 2012-04-23 | 2013-04-23 | Method and system for obtaining information about Wi-Fi enabled telecommunications devices |
Publications (1)
Publication Number | Publication Date |
---|---|
US9226224B1 true US9226224B1 (en) | 2015-12-29 |
Family
ID=54932590
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/868,723 Active 2033-08-22 US9226224B1 (en) | 2012-04-23 | 2013-04-23 | Method and system for obtaining information about Wi-Fi enabled telecommunications devices |
Country Status (1)
Country | Link |
---|---|
US (1) | US9226224B1 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150140982A1 (en) * | 2013-11-15 | 2015-05-21 | Richard Postrel | Method and system for pre and post processing of beacon id signals |
US20150334169A1 (en) * | 2014-05-16 | 2015-11-19 | Verizon Patent And Licensing Inc. | Hardware id based user profile identification and sharing |
US20170078033A1 (en) * | 2015-09-16 | 2017-03-16 | Casio Computer Co., Ltd. | Communication apparatus and computer readable medium |
US9881378B2 (en) | 2016-02-12 | 2018-01-30 | Vortex Intellectual Property Holding LLC | Position determining techniques using image analysis of marks with encoded or associated position data |
US10026003B2 (en) | 2016-03-08 | 2018-07-17 | Accuware, Inc. | Method and arrangement for receiving data about site traffic derived from imaging processing |
US20180310128A1 (en) * | 2017-04-25 | 2018-10-25 | Kabushiki Kaisha Toshiba | Location determination system with mobile wireless terminal |
US10824878B2 (en) | 2016-03-08 | 2020-11-03 | Accuware, Inc. | Method and arrangement for receiving data about site traffic derived from imaging processing |
US11200558B2 (en) * | 2018-01-23 | 2021-12-14 | Advanced New Technologies Co., Ltd. | Automatic vending |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7778186B2 (en) * | 2007-10-10 | 2010-08-17 | Delphi Technologies, Inc. | Fault tolerant vehicle communication and control apparatus |
US8180371B1 (en) * | 2009-08-18 | 2012-05-15 | Sprint Communications Company L.P. | System and method for mobile device self-location |
US20120316940A1 (en) * | 2011-06-09 | 2012-12-13 | Mehran Moshfeghi | System and method for peer-to-peer communication and deal advertising |
US8595070B1 (en) * | 2007-07-17 | 2013-11-26 | Sprint Communications Company L.P. | Coupon validation using radio frequency fingerprinting |
-
2013
- 2013-04-23 US US13/868,723 patent/US9226224B1/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8595070B1 (en) * | 2007-07-17 | 2013-11-26 | Sprint Communications Company L.P. | Coupon validation using radio frequency fingerprinting |
US7778186B2 (en) * | 2007-10-10 | 2010-08-17 | Delphi Technologies, Inc. | Fault tolerant vehicle communication and control apparatus |
US8180371B1 (en) * | 2009-08-18 | 2012-05-15 | Sprint Communications Company L.P. | System and method for mobile device self-location |
US20120316940A1 (en) * | 2011-06-09 | 2012-12-13 | Mehran Moshfeghi | System and method for peer-to-peer communication and deal advertising |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150140982A1 (en) * | 2013-11-15 | 2015-05-21 | Richard Postrel | Method and system for pre and post processing of beacon id signals |
US9544744B2 (en) * | 2013-11-15 | 2017-01-10 | Richard Postrel | Method and system for pre and post processing of beacon ID signals |
US20150334169A1 (en) * | 2014-05-16 | 2015-11-19 | Verizon Patent And Licensing Inc. | Hardware id based user profile identification and sharing |
US10212250B2 (en) * | 2014-05-16 | 2019-02-19 | Verizon Patent And Licensing Inc. | Hardware ID based user profile identification and sharing |
US20170078033A1 (en) * | 2015-09-16 | 2017-03-16 | Casio Computer Co., Ltd. | Communication apparatus and computer readable medium |
US9762337B2 (en) * | 2015-09-16 | 2017-09-12 | Casio Computer Co., Ltd. | Communication apparatus and computer readable medium for executing application programs based on radio-wave intensity |
US9881378B2 (en) | 2016-02-12 | 2018-01-30 | Vortex Intellectual Property Holding LLC | Position determining techniques using image analysis of marks with encoded or associated position data |
US10235769B2 (en) | 2016-02-12 | 2019-03-19 | Vortex Intellectual Property Holding LLC | Position determining techniques using image analysis of marks with encoded or associated position data |
US10026003B2 (en) | 2016-03-08 | 2018-07-17 | Accuware, Inc. | Method and arrangement for receiving data about site traffic derived from imaging processing |
US10824878B2 (en) | 2016-03-08 | 2020-11-03 | Accuware, Inc. | Method and arrangement for receiving data about site traffic derived from imaging processing |
US20180310128A1 (en) * | 2017-04-25 | 2018-10-25 | Kabushiki Kaisha Toshiba | Location determination system with mobile wireless terminal |
US11200558B2 (en) * | 2018-01-23 | 2021-12-14 | Advanced New Technologies Co., Ltd. | Automatic vending |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9226224B1 (en) | Method and system for obtaining information about Wi-Fi enabled telecommunications devices | |
US9594151B1 (en) | System and method for locating objects | |
US9420423B1 (en) | RF beacon deployment and method of use | |
CN105340303B (en) | Short distance user identifying system and the information providing system and method for utilizing it | |
US9084013B1 (en) | Data logging for media consumption studies | |
KR101501032B1 (en) | A service providing system using beacon and sevice providing methods using the system | |
JP5822667B2 (en) | Information providing system, acoustic signal output device, computer program, portable device program, data transmission method, and information acquisition method | |
US20140113560A1 (en) | Dynamic interactive zone driven proximity awareness system | |
US8676228B2 (en) | Tracking system and a method for tracking the position of a device | |
US20160078264A1 (en) | Real time electronic article surveillance and management | |
KR101648827B1 (en) | System for providing event real time location based and method for managing mobile device using the same | |
JP5780569B1 (en) | Digital loss defense security system, method and program | |
CN104509137A (en) | Method and system for communication in a pre-determined location | |
CN103460724A (en) | Communication system and method involving the creation of virtual spaces | |
US20230068152A1 (en) | Location detection systems and methods of use | |
CA2940966C (en) | Systems and methods for tracking, marketing, and/or attributing interest in one or more real estate properties | |
Sykes | A context-aware system using mobile applications and beacons for on-premise security environments | |
KR102275796B1 (en) | System for providing certification of hidden camera | |
JP5969072B2 (en) | Information providing system, acoustic signal output device, computer program, portable device program, data transmission method, and information acquisition method | |
JP2009245213A (en) | Customer attraction information providing system | |
WO2007145450A1 (en) | Mobile communication terminal capable of pinpointing a tag's location and information providing system and service method utilizing both of them | |
KR101527774B1 (en) | Apparatus and method for providing targeting information | |
KR101876954B1 (en) | Apparatus for Monitoring Moving of Client and Driving Method Thereof | |
Shien et al. | A secure mobile crowdsensing (MCS) location tracker for elderly in smart city | |
Golderzahi et al. | Understanding customers and their grouping via wifi sensing for business revenue forecasting |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MEXENS INTELLECTUAL PROPERTY HOLDING LLC, FLORIDA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GIORGETTI, GIANNI;REEL/FRAME:032253/0809 Effective date: 20130610 |
|
AS | Assignment |
Owner name: MEXENS INTELLECTUAL PROPERTY HOLDING LLC, FLORIDA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HOURI, CYRIL;REEL/FRAME:036448/0690 Effective date: 20150824 |
|
AS | Assignment |
Owner name: VORTEX INTELLECTUAL PROPERTY HOLDING LLC, FLORIDA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MEXENS INTELLECTUAL PROPERTY HOLDING LLC;REEL/FRAME:037119/0247 Effective date: 20151123 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
CC | Certificate of correction | ||
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 8 |